General

  • Target

    aa587896aed2ffa708a0d2f636856034_JaffaCakes118

  • Size

    923KB

  • Sample

    241128-a5m5matpdp

  • MD5

    aa587896aed2ffa708a0d2f636856034

  • SHA1

    f906c6e8df5613b9773777f94a6b1a8ad408ed14

  • SHA256

    cb1e959421818bfd984d74595d0b5df2c2b709ea1c14881a30838ae4ed2a0d5f

  • SHA512

    ec01c8855428b8558ad8d224e55934d74608b61e93be0427e04de200657c6d2bbfa6cc0b0b2712e43534a2310a842b3459ec1012fc11609afb76d739a743a24c

  • SSDEEP

    24576:mSLXbC4FylKrdLLkB59d12GUBeHKANy4onenuqds1kXx+:VrylKpoBxjUBP2S6uqGmh+

Malware Config

Extracted

Family

redline

Botnet

felix1008

C2

193.188.22.4:45689

Targets

    • Target

      aa587896aed2ffa708a0d2f636856034_JaffaCakes118

    • Size

      923KB

    • MD5

      aa587896aed2ffa708a0d2f636856034

    • SHA1

      f906c6e8df5613b9773777f94a6b1a8ad408ed14

    • SHA256

      cb1e959421818bfd984d74595d0b5df2c2b709ea1c14881a30838ae4ed2a0d5f

    • SHA512

      ec01c8855428b8558ad8d224e55934d74608b61e93be0427e04de200657c6d2bbfa6cc0b0b2712e43534a2310a842b3459ec1012fc11609afb76d739a743a24c

    • SSDEEP

      24576:mSLXbC4FylKrdLLkB59d12GUBeHKANy4onenuqds1kXx+:VrylKpoBxjUBP2S6uqGmh+

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • SectopRAT

      SectopRAT is a remote access trojan first seen in November 2019.

    • SectopRAT payload

    • Sectoprat family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks